Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault

Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault
Author :
Publisher : IBM Redbooks
Total Pages : 32
Release :
ISBN-10 : 9780738459318
ISBN-13 : 0738459313
Rating : 4/5 (313 Downloads)

Book Synopsis Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault by : Vincent Hsu

Download or read book Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault written by Vincent Hsu and published by IBM Redbooks. This book was released on 2021-01-08 with total page 32 pages. Available in PDF, EPUB and Kindle. Book excerpt: There is a growing insider security risk to organizations. Human error, privilege misuse, and cyberespionage are considered the top insider threats. One of the most dangerous internal security threats is the privileged user with access to critical data, which is the "crown jewels" of the organization. This data is on storage, so storage administration has critical privilege access that can cause major security breaches and jeopardize the safety of sensitive assets. Organizations must maintain tight control over whom they grant privileged identity status to for storage administration. Extra storage administration access must be shared with support and services teams when required. There also is a need to audit critical resource access that is required by compliance to standards and regulations. IBM® SecurityTM Verify Privilege Vault On-Premises (Verify Privilege Vault), formerly known as IBM SecurityTM Secret Server, is the next-generation privileged account management that integrates with IBM Storage to ensure that access to IBM Storage administration sessions is secure and monitored in real time with required recording for audit and compliance. Privilege access to storage administration sessions is centrally managed, and each session can be timebound with remote monitoring. You also can use remote termination and an approval workflow for the session. In this IBM Redpaper, we demonstrate the integration of IBM Spectrum® Scale and IBM Elastic Storage® Server (IBM ESS) with Verify Privilege Vault, and show how to use privileged access management (PAM) for secure storage administration. This paper is targeted at storage and security administrators, storage and security architects, and chief information security officers.


Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault Related Books

Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault
Language: en
Pages: 32
Authors: Vincent Hsu
Categories: Computers
Type: BOOK - Published: 2021-01-08 - Publisher: IBM Redbooks

GET EBOOK

There is a growing insider security risk to organizations. Human error, privilege misuse, and cyberespionage are considered the top insider threats. One of the
IBM ProtecTIER Implementation and Best Practices Guide
Language: en
Pages: 512
Authors: Karen Orlando
Categories: Computers
Type: BOOK - Published: 2016-08-16 - Publisher: IBM Redbooks

GET EBOOK

This IBM® Redbooks® publication provides best practice guidance for planning, installing, configuring, and employing the IBM TS7600 ProtecTIER® family of pro
IBM Spectrum Scale Security
Language: en
Pages: 116
Authors: Felipe Knop
Categories: Computers
Type: BOOK - Published: 2018-09-18 - Publisher: IBM Redbooks

GET EBOOK

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even ins
Securing Your Cloud: IBM Security for LinuxONE
Language: en
Pages: 274
Authors: Lydia Parziale
Categories: Computers
Type: BOOK - Published: 2019-08-01 - Publisher: IBM Redbooks

GET EBOOK

As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IB
Safeguarding Your Technology
Language: en
Pages: 160
Authors: Tom Szuba
Categories: Computer networks
Type: BOOK - Published: 1998 - Publisher:

GET EBOOK